Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

control framework

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management, data center
    
Websense
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
    
KPMG
Published By: Juniper Networks     Published Date: Feb 01, 2016
According to TechTarget, partnering with the right vendor to modernize your network can benefit business in three ways: Simplify the network to make management more efficient Secure the network for total visibility and control Adopt an open framework for agility and scalability
Tags : 
    
Juniper Networks
Published By: KPMG     Published Date: Jul 10, 2018
Digital transformation brings risks and opportunities for internal audit and risk functions. Are you ready to help the business stay safe in an increasingly challenging technology environment? Watch this webinar to understand: • the unique risks from artificial intelligence • the relevance of AI technologies for internal audit and risk functions • what an effective risk and control framework looks like for AI risks • key actions internal audit and risk functions should consider now.
Tags : 
    
KPMG
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Solidcore     Published Date: Jan 07, 2008
This paper lays out the challenges with complying with SOX and suggests a radical solution: build a self-service, automated IT control framework in which all the information required to verify compliance is available in a single reporting system.
Tags : 
compliance, sox, sox compliance, sarbox, sarbox compliance, audit, self audit, self auditing, change management, it controls, solidcore
    
Solidcore
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber, ciso, experts, ebook
    
Tenable
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats, security
    
Skillsoft
Published By: Marketo     Published Date: Mar 18, 2019
The role of marketing is constantly evolving. More than ever, marketing has to prove its impact on the success of the business. Outside executives often believe that marketing exists solely to support sales, or as an arts function that hosts company events and puts logos on t-shirts. With the pressure increasing, the growing imperative for marketers to prove their worth has arrived. It’s time for marketers to take control over the revenue process, earn the respect of their organizational peers, and earn a seat at the table. What must marketers do to be seen as an integral part of the machine that drives revenue and growth? Download The Definitive Guide to Marketing Metrics and Analytics to learn about: Establishing a culture of accountability Planning programs with ROI in mind Creating a framework for measurement Embracing revenue performance management Mastering the art of forecasting Building dashboards to inform complex decisions Implementation across teams, tactics, and technolog
Tags : 
    
Marketo
Published By: NetApp     Published Date: Mar 11, 2015
To enable the data-driven enterprise, IT organizations are moving rapidly to a services-based cloud model. This white paper highlights the challenges of controlling data in hybrid as-a-service IT environments and suggests that data control in hybrid IT should be looked at as a framework rather than as a single effort.
Tags : 
    
NetApp
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Recentemente, una delle domande più comuni dei clienti è: “In che modo AirWatch supporta Office 365?” Molti chiedono se AirWatch possa controllare l’accesso ad Office 365 (O365) non solo sul loro sistema del desktop aziendale, ma soprattutto dai dispositivi mobili. Per fortuna AirWatch® by VMware® fornisce un alto livello di assistenza in modo che le aziende possano sfruttare al meglio O365 sui loro dispositivi mobili e la nostra recente integrazione con VMware® Identity Manager fornisce il primo framework nel settore del controllo di accesso flessibile per garantire che tutte le applicazioni di lavoro, tra cui O365, possano ottenere l’accesso solo da dispositivi gestiti e conformi.
Tags : 
airwatch, emm, office365, cloud, software development, it management, wireless, platforms
    
VMware AirWatch
Published By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : 
microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform, designer-developer collaboration, application life-cycle management, alm, microsoft visual studio team system, version control, work assignment, tracking, builds, testing, shaw group, microsoft .net framework, ch2m hill
    
Microsoft Visual Studio Team System
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, enterprise applications, data center
    
Intralinks
Published By: Intralinks     Published Date: Jan 16, 2015
As the tide of data continues to rise, the burden of protecting sensitive data and preventing security breaches can be crushing. This Forrester TechRadar ™: Data Security report provides a framework for developing a long-term approach to keeping your organization’s information secure. This TechRadar evaluates 20 of the key traditional and emerging data security technologies that can be used to support the key recommendations and best practices of Forrester’s Data Security and Control framework. Key Contents: - Why the Future of Data Security Matters - Why Do These 20 Technologies Appear in the TechRadar?- Most Tech is Still in the Early Stages
Tags : 
data security, sensitive data, secure information, control framework, security
    
Intralinks
Published By: Bit9     Published Date: Mar 07, 2013
Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.
Tags : 
security, risk management, roi, cost reduction, enterprise, cyber threat
    
Bit9
Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb, ciso, security, cloud computing
    
IBM
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management
    
VMware AirWatch
Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
    
VMware
Published By: IBM     Published Date: Jul 14, 2016
Many internal control programs are still undergoing major modifications due to increased PCAOB requirements, adoption of the 2013 COSO Framework, and board focus on risk and compliance processes. Organizations are using several technology approaches to manage the process—some with more success than others. Read this white paper to learn why organizations need to utilize the tools that optimize collaboration and focus on productivity, the pros and cons of desktop-based spreadsheets and GRC platforms, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
As the focus on internal controls moves into its second decade, it'd be easy to assume that most organizations have mastered their processes. However, with the adoption of the 2013 COSO Framework, increased requirements from the PCAOB, and board focus on risk and compliance processes, many internal control programs are undergoing major modifications in numerous areas. Read this e-book to find out how and why companies have made the move to different platforms, including why companies need to focus on utilizing the most productive tools, several technology approaches used by organizations, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
best practices, technology, risk management, compliance, business management
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : 
cloud reporting, business management, economic impact, forrester, consulting, data center
    
IBM
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.