CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

report compliance

Results 51 - 75 of 123Sort Results By: Published Date | Title | Company Name
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution, security, enterprise applications
    
Intralinks
Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution, security, it management, wireless
    
K2
Published By: Key Private Bank     Published Date: May 22, 2018
There are obviously a variety of choices open to you: a spreadsheet plug-in may be appropriate if you are only focused on general ledger reporting and do not have concerns over security or compliance. You might also suppose that this is a low-cost option, though we would argue that the remediation required, the additional audit fees and the lack of repeatability means that this is a false economy and that this approach will end up costing you more in the long term. A second use case would be where you already have a financial reporting solution installed, when the add-on facilities for purposes such as business intelligence are likely to be your major focus. In this case an Oracle based solution is likely to be as good as anything else.
Tags : 
finance, business, planning, integration, strategy, company
    
Key Private Bank
Published By: Kroll Advisory Solutions     Published Date: Aug 02, 2013
First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.
Tags : 
compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
    
Kroll Advisory Solutions
Published By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Published By: LogRhythm     Published Date: Jan 24, 2013
Gartner's 2012 SIEM Magic Quadrant report that positions LogRhythm as a leader against other technologies designed to collect, store, analyze and report on log data for regulatory compliance and forensics.
Tags : 
logrhythm, magic quadrant, security information, event management, gartner, security, it management, data management, business technology, data center
    
LogRhythm
Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: McAfee     Published Date: Jan 24, 2013
This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability life-cycle management perspective. Download this white paper to learn more.
Tags : 
miercom lab test report, mcafee risk management, vulnerability life cycle management, security and compliance, mcafee epolicy orchestrator, mcafee global threat intelligence, mcafee labs, malware, asset inventory, mcafee vulnerability manager, vulnerability detection, mcafee gti, security, data management, business technology, data center
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance, security
    
McAfee
Published By: Microsoft Office 365     Published Date: Jan 21, 2016
Learn how much money your business can save. In an objective study commissioned by Microsoft, Forrester Consulting investigated the Total Economic Impact™ for small to medium sized businesses, with 1 to 250 employees, using Office 365. The study revealed a sizeable return on investment. One business founder had this to say, “The productivity gain is the main thing for me with Office 365. It’s allowed everybody to be more productive, and if there is any element of downtime on hardware, it’s just a case of moving into another location, whether it’d be the next desk, office, or Starbucks.” Discover these findings and more when you download the free report: • Improved Business Continuity. How enhanced business continuity lead to an avoidance in lost billable hours of $15,000 annually. • Increased mobile worker productivity. How an investment in mobility saved45 hours per year per worker. • Lowered Security, Risk, and Compliance Costs. How an organization went from 15 data breaches per year
Tags : 
it management
    
Microsoft Office 365
Published By: Mimecast     Published Date: Jul 15, 2019
This report reflects the review and technical assessment of the Mimecast Compliance Protect feature with respect to the regulatory requirements set forth in the following regulations and rules:
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Oct 02, 2019
Forrester Research provides insights into the key trends that are impacting your business today. The Information Archiving Now Tech report is an invaluable tool for anyone actively considering or comparing Information Archiving solutions. No matter where you sit in your organization, this is a must-read to help you build a modern, secure archive that’s purpose built for e-discovery, compliance and end-user productivity. With a credible, side-by-side comparison of leading products, you can make a more informed investment that best fits the diverse needs of your business.
Tags : 
    
Mimecast
Published By: NAVEX Global     Published Date: Mar 04, 2014
NAVEX Global commissioned an independent third party study of over 300 Ethics and Compliance senior level decision makers in compliance, HR, legal and risk roles across multiple industries, to understand how they are allocating their budgets and which activities are contributing to their program success. Download this spending research report to benchmark your program and use these key lessons from your peers to boost your ethics and compliance programs' effectiveness.
Tags : 
navex global, ethics and compliance, compliance function, organizational imperative, corporate management, compliance implementation, effective compliance, budget driver, protection, reputation, human resources
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 15, 2016
Join us for a complimentary webinar where we will unveil the findings from the first ever NAVEX Global EMEA & APAC Whistleblowing Hotline Benchmark Report.
Tags : 
webinar, navex, data, benchmark, compliance programmes, compliance programme webinar, compliance
    
NAVEX Global
Published By: NAVEX Global     Published Date: May 06, 2016
This report outlines Data & Analysis to Help You Benchmark Your Programme Against the World’s Largest Ethics & Compliance Hotline Database—and Enhance Your Ethics & Compliance Programme Effectiveness.
Tags : 
data analysis, benchmarking
    
NAVEX Global
Published By: NAVEX Global     Published Date: Oct 18, 2016
This report aims to help you identify the compliance program you have in place, how to document your program elements and finally, develop and implement a work plan for addressing gaps.
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : 
measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 07, 2017
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme, including: Does our culture support employees who raise concerns? Are our communications with employees reaching the intended audiences and having the desired effect? Are our investigations thorough and effective? Do we need more training? Do we need to review or update our policies? Do employees know about our reporting channels? Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. This year’s analysis of our EMEA & APAC data from nearly 14,000 ethics and compliance hotline reports revealed key data points that compliance professionals can use to benchmark and assess their programme’s performance, and move toward predictive risk mitigation.
Tags : 
navex, ethics and compliance software, hotline data, risk mitigation, incident management systems
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 20, 2018
Our new market report takes an in depth look at recent developments and offers insight into running a compliant and ethical global business. With primary research and articles written by industry experts, you’ll get answers to some of today’s most important questions like: How are businesses navigating the risks posed by global supply chains? Have compliance risks changed since the rise of anti-corruption purges? How do you set the right tone for disclosing misconduct in the workplace? How can I evaluate the integrity of third parties within the era of fake news?
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
Compare your employee reporting metrics and measure your compliance programme & organisational culture against 4.5 million reports. Get answers to questions like: Are your employees likely to speak up? Are there reports of misconduct you’re missing? Does fear of retaliation encourage external reports? NAVEX Global's key findings in the following areas: Report volume Report allegation categories Anonymous vs named reporting Follow up and substantiation rates Case closure times
Tags : 
    
NAVEX Global
Published By: NetIQ     Published Date: Dec 23, 2010
To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. This document deals with file integrity monitoring (FIM) for PCI, while providing practical technical guidance to help ensure PCI Compliance before your auditor shows up to develop the ROC.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, auditing, compliance
    
NetIQ
Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, auditing, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, password management, vulnerability management
    
NetIQ
Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc, audit, regulatory compliance, access control, compliance, internet security, intrusion detection, intrusion prevention, vulnerability management
    
NetIQ
Start   Previous    1 2 3 4 5    Next    End
Search