Auditing (Finance) White Papers
-
Information Security Magazine: October Issue
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
-
Speed Up Your Business with E-Signatures
Sponsored by: Adobe EchoSignThis white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
-
ESIGN Act A Well-Established Law Enabling Business Transformation Today
Sponsored by: Adobe EchoSignThis paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
-
5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
Sponsored by: APTAREIn this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
-
Baseline Discovery Audit Datasheet
Sponsored by: BMC-AccentureThis exclusive resource presents a baseline discovery auditing solution to help you gain insight into key infrastructure and application dependencies in your environment, before embarking on cloud, automation, or proactive operations initiatives.
-
Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
Sponsored by: Oracle CorporationOracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
-
Distributed Data Capture: Reducing the Cost of Remote Business Processes
Sponsored by: Kofax, Inc.In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process.
-
Simplify Compliance and Security with Novell® Sentinel™ Log Manager
Sponsored by: Novell, Inc.Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware.
-
Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email
Sponsored by: Coviant Software CorporationRead this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers.
-
Case Study: Fortune 100 Insurance Company and Security Weaver
Sponsored by: Security WeaverFor the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
-
Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
Sponsored by: Security WeaverIn January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
-
E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
Sponsored by: IBMRead this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
-
Prepare for Vendor Audits and Improve Software Asset Management with Integrated IBM Solutions
Sponsored by: IBMRead how effective software asset management supports both cost effectiveness and cost efficiency by matching inventory with actual deployments, thereby helping to reduce over- and under-licensing.
-
Cloud-Stored Offsite Database Backups
Sponsored by: Oracle CorporationCloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.
-
File Security: Audit and Protect Critical Files
Sponsored by: ImpervaRead this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
-
Better Active Directory Auditing...Less Overhead, More Power
Sponsored by: Netwrix CorporationToday’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make.
-
ASG-Discovery and Dependency Mapping (ASG-DDM)™
Sponsored by: ASG Software SolutionsUnderstanding which hardware and software components support which business systems is extremely difficult. For many years, the clipboard and spreadsheet appear to have been the tools of choice, with the result that many decisions were made based on outdated and inaccurate information. Read this paper to find out more.
-
Business-Critical Benefits of Workload Automation Solutions
Sponsored by: ASG Software SolutionsEnterprises have struggled with workload automation (WLA) implementation because of its complexities, dependencies, and costs. These obstacles existed primarily because WLA was simply not a mature technology. However, today WLA solutions are widely accessible and achievable. Read this paper to learn about the latest innovations.
-
Authentication in the Enterprise: Current and Changing Requirements
Sponsored by: PistolStar, Inc.This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
-
Technology Implications of IFRS adoption for U.S. Companies: More than a technical accounting change
Sponsored by: DeloitteIn this publication, we explore the technology implications associated with IFRS conversion and discuss: Evaluating the potential technology impact; how companies can prepare technology and systems changes related to IFRS adoption; Major differences between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS and much more.
-
How Integration Tax Management Systems Can Benefit from Effective Taxpayer Communication Strategies
Sponsored by: Pitney Bowes Group 1 SoftwareThe white paper details Integrated Tax Management, software that brings together all State revenue collection processes, including those performed by the Federal Government, and collections on behalf of municipalities.