CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

report compliance

Results 1 - 25 of 123Sort Results By: Published Date | Title | Company Name
Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10
    
A10 Networks
Published By: Abacus Labs     Published Date: Jun 14, 2018
The purpose of expense reporting software is to streamline your team’s workflow for submitting and reviewing business expenditures. By implementing an expense management solution, you can decrease the time and costs associated with processing expenses and increase your visibility into the implications of business spend, while helping improve general expense policy compliance and reduce expense fraud.
Tags : 
reporting, software, expense, finance, business, management
    
Abacus Labs
Published By: Aberdeen Group     Published Date: Sep 25, 2012
The report will show how Best-in-Class organizations are prioritizing their social spend to improve personalization and brand compliance.
Tags : 
retail, aberdeen, omni-channel, social, social marketing, marketing, social network, social media
    
Aberdeen Group
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
    
Alert Logic and Sungard Availability Services
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : 
alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology, event data, correlations, user activity monitoring
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: Arena Solutions     Published Date: Mar 28, 2017
This white paper reports on how new innovations are helping accelerate new product introductions, improving collaboration with outsourced partners and suppliers, and enabling organizations to achieve compliance with confidence.
Tags : 
arena solutions, arena, bill of materials, bom, product innovation, manufacturing, collaboration, productivity
    
Arena Solutions
Published By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why it’s time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance — and, more importantly — what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, business technology
    
Avalara
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security, compliance
    
Cenzic
Published By: CIC Plus     Published Date: Sep 23, 2014
Learn more about HR compliance under Section 6056 of the ACA, including: • New reporting requirements for 2015 • What those requirements mean for your business • What you can do to ensure compliance • Risks of noncompliance
Tags : 
aca, affordable healthcare act, aca compliance, obamacare, irs section 6056, hr compliance, online hr forms, onboarding
    
CIC Plus
Published By: Crownpeak     Published Date: Sep 21, 2016
In this Forrester Research report, you'll learn: - How regulated industries can personalize web experiences without risk - Which CMS providers are equipped to help archive personalized experiences while maintaining industry compliance - How to assess whether a CMS vendor can meet your complex r
Tags : 
crownpeak, forrester, forrester research, web experience, contextual, online customer experience, personalization, web content management
    
Crownpeak
Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, security, it management, data management, firewalls
    
DataMotion
Published By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : 
software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware
    
Dell Software
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: DocuSign     Published Date: Mar 23, 2016
Download this complimentary Ombud analyst report which examines best practices for leveraging DocuSign’s Digital Transaction Management solution for CIA compliance and the impact such technologies are already having on forward-thinking Fortune 500 companies.
Tags : 
    
DocuSign
Published By: DocuSign UK     Published Date: Nov 06, 2018
"In today’s intensely competitive marketplace, the business world is moving rapidly to online transactions from inefficient, costly, paper-based processes. Furthermore, consumers expect to be able to interact digitally anytime, anyplace, so providing easily accessible digital touchpoints is also critical to successfully keeping and retaining your customers. No matter the size or type of business you’re in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that. Read the report to learn how leading companies across industries are improving critical business processes using eSignatures to achieve: - Greater customer satisfaction - Higher close rates and productivity - Lower costs, greater efficiency - Improved time to revenue - Compliance and security-risk mitigation"
Tags : 
    
DocuSign UK
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
    
Ecora Software
Start   Previous   1 2 3 4 5    Next    End
Search