CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

auditing

Results 1 - 25 of 135Sort Results By: Published Date | Title | Company Name
Published By: AppZen     Published Date: Oct 21, 2019
Modern finance teams are adopting AI to automate processes and enable complex decision making across a broad swath of their operations. AI-powered spend auditing is especially promising because expenses and payables are rife with spend leakage, non-compliance, and inefficiencies. Download this whitepaper to learn how to evaluate potential AI-powered spend auditing solutions.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Oct 21, 2019
Accounts payable departments at large enterprises pay thousands of invoices each month. With such a large volume of invoices, companies leave themselves at risk for overpayment and potential invoice fraud. As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?
Tags : 
    
AppZen
Published By: AppZen     Published Date: Oct 21, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Comply with regulations like FCPA - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: ConnectWise     Published Date: Aug 22, 2019
Patches correct bugs, flaws and provide enhancements, which can prevent potential user impact, improve user experience and potentially save your technicians time researching and repairing issues that could have already been resolved or prevented with an existing update. Clients generally understand that their systems need to be patched, but they likely do not have the expertise to comfortably approve and install patches without help. When operating within the IT services industry, patching is one of the first areas that competitors auditing your clients will assess. Developing best practices to manage the risks associated with the approval and deployment of patches is critical to your IT department's service offering.
Tags : 
    
ConnectWise
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Comply with regulations like FCPA - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Reimburse employees same-day - Make sure expenses and invoices comply with policy - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Eliminate fraud and waste - Streamline process
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 15, 2019
Accounts payable departments at large enterprises pay thousands of invoices each month. With such a large volume of invoices, companies leave themselves at risk for over-payment and potential invoice fraud. As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?
Tags : 
    
AppZen
Published By: Sage EMEA     Published Date: May 31, 2019
Making Tax Digital (MTD) is part of a global trend. Governments around the world are making moves to implement electronic data submission and auditing requirements. It makes sense for them, of course – governments say that they are losing billions in tax revenue every year due to non-compliance, whether that’s through simple error or conscious fraud.
Tags : 
    
Sage EMEA
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
workday, workday technology, digital strategy, financial auditing
    
Workday Nordics
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Concur ENT     Published Date: Nov 07, 2017
Concur’s Audit services provide a thorough, objective, third-party review without office politics or a strain on internal resources. Businesses have saved time and money by redirecting those resources into other valuable activities, while turning audits around efficiently and accurately. Visit concur.co.uk/expense-audit or call Features outlined in this report may differ between Standard 01628 645100 to learn more.
Tags : 
auditing, configuration, reporting, data, email reminders, communication, concur
    
Concur ENT
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Privileged Access Management umfasst Funktionen für Kontrolle, Monitoring und Auditing, mit denen die Risiken im Zusammenhang mit privilegierten Anwendern, Accounts und Anmeldeinformationen gemindert werden sollen. In den letzten Jahren hat sich herausgestellt, dass diese Aufgabe für Unternehmen aller Arten hohe Priorität hat. Diesem Anstieg an Interesse und Aufmerksamkeit liegen mehrere Faktoren zugrunde:
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Concur     Published Date: Aug 15, 2017
At Concur, we receive a lot of questions about the best way to audit expense claims. Often the approaches to audit vary greatly by industry and company culture. It doesn’t have to be confusing. In this report, we hope to provide a clear perspective that can help every business identify ways to improve their audit process.
Tags : 
reporting, configuration, auditing, email reminders, data, communication, concur, maxus
    
Concur
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Published By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint
Published By: Rizepoint     Published Date: Feb 13, 2017
Download this white paper,Improving RTE Food Safety by Building a more Complete and Modern Safety Management System, and read about the food safety challenges of ready-to-eat and fresh prepared foods, and how technology plays a growing role in achieving active managerial control with crucial characteristics and capabilities required for a next-generation food safety auditing solution.
Tags : 
    
Rizepoint
Published By: Rizepoint     Published Date: Feb 13, 2017
Every successful multi-unit food service or hospitality organization understands the importance of consistent audits and recognizes the essential function they provide. Today, thousands of businesses—from giant multi-national chains to small family-owned businesses—depend on regular internal and third-party audits to monitor, control, and manage everything from sanitation and food safety regulations to internal facility standards and brand consistency.
Tags : 
    
Rizepoint
Published By: Rizepoint     Published Date: Feb 13, 2017
At the most fundamental level, your company’s brand is the central, defining promise you make to your customers—and the sum of every transaction, impression, and experience they have with your business. So in a very practical sense, the strength of your brand is directly connected to how consistently you keep those promises—day in and day out—across all of your locations or properties.
Tags : 
    
Rizepoint
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Tyco Integrated Security Video Auditing enables the company to leverage their existing quality control and production procedure, providing more functionality without a huge investment.
Tags : 
tyco, security, food processing, manufacturing, quality control
    
Tyco Integrated Security
Published By: IBM     Published Date: Sep 29, 2015
Enhanced capabilities that could better meet its needs.
Tags : 
onboarding, hire, talent, integration, auditing, cloud, productivity
    
IBM
Published By: VMware AirWatch     Published Date: Sep 16, 2015
In this report, read about how AirWatch by VMware provides EMM suites to help organizations integrate mobile devices into their security framework, and provides tools for easier auditing and reporting, provisioning, support, data defense.
Tags : 
airwatch, security, data defense, mobile, emm, it management, business technology
    
VMware AirWatch
Start   Previous   1 2 3 4 5 6    Next    End
Search